{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T01:04:29Z","timestamp":1773277469184,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,10,15]],"date-time":"2018-10-15T00:00:00Z","timestamp":1539561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Research Foundation of Korea (NRF)","award":["NRF-2017R1A2B3006360"],"award-info":[{"award-number":["NRF-2017R1A2B3006360"]}]},{"name":"German Federal Ministry of Education and Research (BMBF)","award":["The Center for IT-Security Privacy and Accountability (CISPA)"],"award-info":[{"award-number":["The Center for IT-Security Privacy and Accountability (CISPA)"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,10,15]]},"DOI":"10.1145\/3243734.3243748","type":"proceedings-article","created":{"date-parts":[[2018,10,16]],"date-time":"2018-10-16T17:38:33Z","timestamp":1539711513000},"page":"1441-1454","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":19,"title":["Lord of the x86 Rings"],"prefix":"10.1145","author":[{"given":"Hojoon","family":"Lee","sequence":"first","affiliation":[{"name":"CISPA Helmholtz Center i.G., Saarbrucken, Germany"}]},{"given":"Chihyun","family":"Song","sequence":"additional","affiliation":[{"name":"Korea Advanced Institute of Science and Technology, Daejeon, Rebublic of Korea"}]},{"given":"Brent Byunghoon","family":"Kang","sequence":"additional","affiliation":[{"name":"Korea Advanced Institute of Science and Technology, Daejeon, Rebublic of Korea"}]}],"member":"320","published-online":{"date-parts":[[2018,10,15]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945462"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2799647"},{"key":"e_1_3_2_2_3_1","volume-title":"Dune: Safe User-level Access to Privileged CPU Features Proceedings of the 10th USENIX Conference on Operating Systems Design and Implementation (OSDI'12)","author":"Belay Adam","year":"2012","unstructured":"Adam Belay , Andrea Bittau , Ali Mashtizadeh , David Terei , David Mazi\u00e8res , and Christos Kozyrakis . 2012 . Dune: Safe User-level Access to Privileged CPU Features Proceedings of the 10th USENIX Conference on Operating Systems Design and Implementation (OSDI'12) . USENIX Association , Berkeley, CA, USA , 335--348. http:\/\/dl.acm.org\/citation.cfm?id=2387880.2387913 Adam Belay, Andrea Bittau, Ali Mashtizadeh, David Terei, David Mazi\u00e8res, and Christos Kozyrakis. 2012. Dune: Safe User-level Access to Privileged CPU Features Proceedings of the 10th USENIX Conference on Operating Systems Design and Implementation (OSDI'12). USENIX Association, Berkeley, CA, USA, 335--348. http:\/\/dl.acm.org\/citation.cfm?id=2387880.2387913"},{"key":"e_1_3_2_2_4_1","volume-title":"Wedge: Splitting Applications into Reduced-privilege Compartments Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation (NSDI'08)","author":"Bittau Andrea","year":"2008","unstructured":"Andrea Bittau , Petr Marchenko , Mark Handley , and Brad Karp . 2008 . Wedge: Splitting Applications into Reduced-privilege Compartments Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation (NSDI'08) . USENIX Association , Berkeley, CA, USA , 309--322. http:\/\/dl.acm.org\/citation.cfm?id=1387589.1387611 Andrea Bittau, Petr Marchenko, Mark Handley, and Brad Karp. 2008. Wedge: Splitting Applications into Reduced-privilege Compartments Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation (NSDI'08). USENIX Association, Berkeley, CA, USA, 309--322. http:\/\/dl.acm.org\/citation.cfm?id=1387589.1387611"},{"key":"e_1_3_2_2_5_1","volume-title":"Privtrans: Automatically Partitioning Programs for Privilege Separation Proceedings of the 13th Conference on USENIX Security Symposium -","volume":"13","author":"Brumley David","year":"2004","unstructured":"David Brumley and Dawn Song . 2004 . Privtrans: Automatically Partitioning Programs for Privilege Separation Proceedings of the 13th Conference on USENIX Security Symposium - Volume 13 (SSYM'04). USENIX Association, Berkeley, CA, USA, 5--5. http:\/\/dl.acm.org\/citation.cfm?id=1251375.1251380 David Brumley and Dawn Song. 2004. Privtrans: Automatically Partitioning Programs for Privilege Separation Proceedings of the 13th Conference on USENIX Security Symposium - Volume 13 (SSYM'04). USENIX Association, Berkeley, CA, USA, 5--5. http:\/\/dl.acm.org\/citation.cfm?id=1251375.1251380"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382553.2382554"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3052983"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1353534.1346284"},{"key":"e_1_3_2_2_9_1","volume-title":"Shreds: Fine-Grained Execution Units with Private Memory 2016 IEEE Symposium on Security and Privacy (SP). 56--71","author":"Chen Y.","unstructured":"Y. Chen , S. Reymondjohnson , Z. Sun , and L. Lu . 2016 . Shreds: Fine-Grained Execution Units with Private Memory 2016 IEEE Symposium on Security and Privacy (SP). 56--71 . Y. Chen, S. Reymondjohnson, Z. Sun, and L. Lu. 2016. Shreds: Fine-Grained Execution Units with Private Memory 2016 IEEE Symposium on Security and Privacy (SP). 56--71."},{"key":"e_1_3_2_2_10_1","unstructured":"Jonathan Corbet. 2012. Supervisor mode access prevention. https:\/\/lwn.net\/Articles\/517475\/. (2012).  Jonathan Corbet. 2012. Supervisor mode access prevention. https:\/\/lwn.net\/Articles\/517475\/. (2012)."},{"key":"e_1_3_2_2_11_1","unstructured":"Jonathan Corbet. 2015. Memory protection keys. https:\/\/lwn.net\/Articles\/643797\/. (2015).  Jonathan Corbet. 2015. Memory protection keys. https:\/\/lwn.net\/Articles\/643797\/. (2015)."},{"key":"e_1_3_2_2_12_1","volume-title":"2018 a. Inteltextsuperscript\u00ae Software Guard Extensions (Intel SGX). https:\/\/software.intel.com\/en-us\/sgx. (2018). Last accessed Feb 27","author":"Intel Corp","year":"2018","unstructured":"Intel Corp eration. 2018 a. Inteltextsuperscript\u00ae Software Guard Extensions (Intel SGX). https:\/\/software.intel.com\/en-us\/sgx. (2018). Last accessed Feb 27 , 2018 ,. Intel Corperation. 2018 a. Inteltextsuperscript\u00ae Software Guard Extensions (Intel SGX). https:\/\/software.intel.com\/en-us\/sgx. (2018). Last accessed Feb 27 , 2018,."},{"key":"e_1_3_2_2_13_1","volume-title":"2018 b. Introduction to Inteltextsuperscript\u00ae Memory Protection Extensions. https:\/\/software.intel.com\/en-us\/articles\/introduction-to-intel-memory-protection-extensions. (2018). Last accessed Feb 22","author":"Intel Corp","year":"2018","unstructured":"Intel Corp eration. 2018 b. Introduction to Inteltextsuperscript\u00ae Memory Protection Extensions. https:\/\/software.intel.com\/en-us\/articles\/introduction-to-intel-memory-protection-extensions. (2018). Last accessed Feb 22 , 2018 ,. Intel Corperation. 2018 b. Introduction to Inteltextsuperscript\u00ae Memory Protection Extensions. https:\/\/software.intel.com\/en-us\/articles\/introduction-to-intel-memory-protection-extensions. (2018). Last accessed Feb 22 , 2018,."},{"key":"e_1_3_2_2_14_1","volume-title":"2018 c. System V Application Binary Interface. https:\/\/software.intel.com\/sites\/default\/files\/article\/402129\/mpx-linux64-abi.pdf. (2018). Last accessed Feb 21","author":"Intel Corp","year":"2018","unstructured":"Intel Corp eration. 2018 c. System V Application Binary Interface. https:\/\/software.intel.com\/sites\/default\/files\/article\/402129\/mpx-linux64-abi.pdf. (2018). Last accessed Feb 21 , 2018 ,. Intel Corperation. 2018 c. System V Application Binary Interface. https:\/\/software.intel.com\/sites\/default\/files\/article\/402129\/mpx-linux64-abi.pdf. (2018). Last accessed Feb 21 , 2018,."},{"key":"e_1_3_2_2_15_1","volume-title":"VirtualBox Technical documentation. https:\/\/www.virtualbox.org\/wiki\/Technical_documentation. (2017). Last accessed","author":"Oracle Corporation","year":"2017","unstructured":"Oracle Corporation . 2017. VirtualBox Technical documentation. https:\/\/www.virtualbox.org\/wiki\/Technical_documentation. (2017). Last accessed Aug 23, 2017 . Oracle Corporation. 2017. VirtualBox Technical documentation. https:\/\/www.virtualbox.org\/wiki\/Technical_documentation. (2017). Last accessed Aug 23, 2017."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2775054.2694386"},{"key":"e_1_3_2_2_17_1","volume-title":"White Paper: AMD Memory Encryption. AMD.","author":"David Kaplan Tom Woller","year":"2016","unstructured":"Tom Woller David Kaplan , Jeremy Powell . 2016 . White Paper: AMD Memory Encryption. AMD. Tom Woller David Kaplan, Jeremy Powell. 2016. White Paper: AMD Memory Encryption. AMD."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663755"},{"key":"e_1_3_2_2_19_1","volume-title":"Proceedings of the 7th Symposium on Operating Systems Design and Implementation (OSDI '06)","author":"Erlingsson \u00dalfar","unstructured":"\u00dalfar Erlingsson , Mart'\u0131n Abadi , Michael Vrable , Mihai Budiu , and George C. Necula . 2006. XFI: Software Guards for System Address Spaces . In Proceedings of the 7th Symposium on Operating Systems Design and Implementation (OSDI '06) . USENIX Association, Berkeley, CA, USA, 75--88. http:\/\/dl.acm.org\/citation.cfm?id=1298455.1298463 \u00dalfar Erlingsson, Mart'\u0131n Abadi, Michael Vrable, Mihai Budiu, and George C. Necula. 2006. XFI: Software Guards for System Address Spaces. In Proceedings of the 7th Symposium on Operating Systems Design and Implementation (OSDI '06). USENIX Association, Berkeley, CA, USA, 75--88. http:\/\/dl.acm.org\/citation.cfm?id=1298455.1298463"},{"key":"e_1_3_2_2_20_1","volume-title":"Vx32: Lightweight User-level Sandboxing on the x86 USENIX 2008 Annual Technical Conference (ATC'08)","author":"Ford Bryan","unstructured":"Bryan Ford and Russ Cox . 2008. Vx32: Lightweight User-level Sandboxing on the x86 USENIX 2008 Annual Technical Conference (ATC'08) . USENIX Association , Berkeley, CA, USA , 293--306. http:\/\/dl.acm.org\/citation.cfm?id=1404014.1404039 Bryan Ford and Russ Cox. 2008. Vx32: Lightweight User-level Sandboxing on the x86 USENIX 2008 Annual Technical Conference (ATC'08). USENIX Association, Berkeley, CA, USA, 293--306. http:\/\/dl.acm.org\/citation.cfm?id=1404014.1404039"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2490301.2451146"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978327"},{"key":"e_1_3_2_2_23_1","volume-title":"https:\/\/www.nginx.com. (2018). Last accessed Feb 27","author":"NGINX Inc. 2018. Nginx.","year":"2018","unstructured":"NGINX Inc. 2018. Nginx. https:\/\/www.nginx.com. (2018). Last accessed Feb 27 , 2018 ,. NGINX Inc. 2018. Nginx. https:\/\/www.nginx.com. (2018). Last accessed Feb 27 , 2018,."},{"key":"e_1_3_2_2_24_1","unstructured":"Intel Corporation. 2016. Inteltextsuperscript\u00ae 64 and IA-32 Architectures Software Developer's Manual. Number 325462-061US.  Intel Corporation. 2016. Inteltextsuperscript\u00ae 64 and IA-32 Architectures Software Developer's Manual. Number 325462-061US."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382280"},{"key":"e_1_3_2_2_26_1","volume-title":"USENIX Annual Technical Conference, FREENIX Track (2003-09-03)","author":"Kilpatrick Douglas","year":"2003","unstructured":"Douglas Kilpatrick . 2003 . Privman: A Library for Partitioning Applications .. USENIX Annual Technical Conference, FREENIX Track (2003-09-03) . USENIX, 273--284. http:\/\/dblp.uni-trier.de\/db\/conf\/usenix\/usenix2003f.html#Kilpatrick03 Douglas Kilpatrick. 2003. Privman: A Library for Partitioning Applications.. USENIX Annual Technical Conference, FREENIX Track (2003-09-03). USENIX, 273--284. http:\/\/dblp.uni-trier.de\/db\/conf\/usenix\/usenix2003f.html#Kilpatrick03"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3064176.3064217"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872362.2872372"},{"key":"e_1_3_2_2_29_1","volume-title":"Hacking in Darkness: Return-oriented Programming against Secure Enclaves 26th USENIX Security Symposium (USENIX Security 17)","author":"Lee Jaehyuk","unstructured":"Jaehyuk Lee , Jinsoo Jang , Yeongjin Jang , Nohyun Kwak , Yeseul Choi , Changho Choi , Taesoo Kim , Marcus Peinado , and Brent ByungHoon Kang . 2017. Hacking in Darkness: Return-oriented Programming against Secure Enclaves 26th USENIX Security Symposium (USENIX Security 17) . USENIX Association , Vancouver, BC , 523--539. https:\/\/www.usenix.org\/conference\/usenixsecurity17\/technical-sessions\/presentation\/lee-jaehyuk Jaehyuk Lee, Jinsoo Jang, Yeongjin Jang, Nohyun Kwak, Yeseul Choi, Changho Choi, Taesoo Kim, Marcus Peinado, and Brent ByungHoon Kang. 2017. Hacking in Darkness: Return-oriented Programming against Secure Enclaves 26th USENIX Security Symposium (USENIX Security 17). USENIX Association, Vancouver, BC, 523--539. https:\/\/www.usenix.org\/conference\/usenixsecurity17\/technical-sessions\/presentation\/lee-jaehyuk"},{"key":"e_1_3_2_2_30_1","volume-title":"2014 USENIX Annual Technical Conference (USENIX ATC 14)","author":"Li Yanlin","year":"2014","unstructured":"Yanlin Li , Jonathan McCune , James Newsome , Adrian Perrig , Brandon Baker , and Will Drewry . 2014 . MiniBox: A Two-Way Sandbox for x86 Native Code . In 2014 USENIX Annual Technical Conference (USENIX ATC 14) . USENIX Association, Philadelphia, PA, 409--420. https:\/\/www.usenix.org\/conference\/atc14\/technical-sessions\/presentation\/li_yanlin Yanlin Li, Jonathan McCune, James Newsome, Adrian Perrig, Brandon Baker, and Will Drewry. 2014. MiniBox: A Two-Way Sandbox for x86 Native Code. In 2014 USENIX Annual Technical Conference (USENIX ATC 14). USENIX Association, Philadelphia, PA, 409--420. https:\/\/www.usenix.org\/conference\/atc14\/technical-sessions\/presentation\/li_yanlin"},{"key":"e_1_3_2_2_31_1","unstructured":"ARM Limited. 2009. Building a Secure System using TrustZone\u00ae Technolog. http:\/\/infocenter.arm.com\/help\/topic\/com.arm.doc.prd29-genc-009492c\/PRD29-GENC-009492C_trustzone_security_whitepaper.pdf. (2009).  ARM Limited. 2009. Building a Secure System using TrustZone\u00ae Technolog. http:\/\/infocenter.arm.com\/help\/topic\/com.arm.doc.prd29-genc-009492c\/PRD29-GENC-009492C_trustzone_security_whitepaper.pdf. (2009)."},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813690"},{"key":"e_1_3_2_2_33_1","volume-title":"Proceedings of the 15th Conference on USENIX Security Symposium -","volume":"15","author":"McCamant Stephen","year":"2006","unstructured":"Stephen McCamant and Greg Morrisett . 2006 . Evaluating SFI for a CISC Architecture . In Proceedings of the 15th Conference on USENIX Security Symposium - Volume 15 (USENIX-SS'06). USENIX Association, Berkeley, CA, USA, Article bibinfoarticleno15. http:\/\/dl.acm.org\/citation.cfm?id=1267336.1267351 Stephen McCamant and Greg Morrisett. 2006. Evaluating SFI for a CISC Architecture. In Proceedings of the 15th Conference on USENIX Security Symposium - Volume 15 (USENIX-SS'06). USENIX Association, Berkeley, CA, USA, Article bibinfoarticleno15. http:\/\/dl.acm.org\/citation.cfm?id=1267336.1267351"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.17"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2254064.2254111"},{"key":"e_1_3_2_2_36_1","volume-title":"http:\/\/www.libressl.org. (2017). Last accessed Feb 27","author":"BSD.","year":"2018","unstructured":"Open BSD. 2017. LibreSSL. http:\/\/www.libressl.org. (2017). Last accessed Feb 27 , 2018 ,. OpenBSD. 2017. LibreSSL. http:\/\/www.libressl.org. (2017). Last accessed Feb 27 , 2018,."},{"key":"e_1_3_2_2_37_1","volume-title":"The Linux Kernel Archives. https:\/\/www.kernel.org. (2018). Last accessed April 2","author":"Linux Kernel Organization","year":"2018","unstructured":"Linux Kernel Organization . 2018. The Linux Kernel Archives. https:\/\/www.kernel.org. (2018). Last accessed April 2 , 2018 ,. Linux Kernel Organization. 2018. The Linux Kernel Archives. https:\/\/www.kernel.org. (2018). Last accessed April 2 , 2018,."},{"key":"e_1_3_2_2_38_1","volume-title":"Proceedings of the 12th Conference on USENIX Security Symposium -","volume":"12","author":"Provos Niels","year":"2003","unstructured":"Niels Provos , Markus Friedl , and Peter Honeyman . 2003 . Preventing Privilege Escalation . In Proceedings of the 12th Conference on USENIX Security Symposium - Volume 12 (SSYM'03). USENIX Association, Berkeley, CA, USA, 16--16. http:\/\/dl.acm.org\/citation.cfm?id=1251353.1251369 Niels Provos, Markus Friedl, and Peter Honeyman. 2003. Preventing Privilege Escalation. In Proceedings of the 12th Conference on USENIX Security Symposium - Volume 12 (SSYM'03). USENIX Association, Berkeley, CA, USA, 16--16. http:\/\/dl.acm.org\/citation.cfm?id=1251353.1251369"},{"key":"e_1_3_2_2_39_1","volume-title":"Adapting Software Fault Isolation to Contemporary CPU Architectures Proceedings of the 19th USENIX Conference on Security (USENIX Security'10)","author":"Sehr David","year":"1929","unstructured":"David Sehr , Robert Muth , Cliff Biffle , Victor Khimenko , Egor Pasko , Karl Schimpf , Bennet Yee , and Brad Chen . 2010. Adapting Software Fault Isolation to Contemporary CPU Architectures Proceedings of the 19th USENIX Conference on Security (USENIX Security'10) . USENIX Association , Berkeley, CA, USA , 1--1. http:\/\/dl.acm.org\/citation.cfm?id= 1929 820.1929822 David Sehr, Robert Muth, Cliff Biffle, Victor Khimenko, Egor Pasko, Karl Schimpf, Bennet Yee, and Brad Chen. 2010. Adapting Software Fault Isolation to Contemporary CPU Architectures Proceedings of the 19th USENIX Conference on Security (USENIX Security'10). USENIX Association, Berkeley, CA, USA, 1--1. http:\/\/dl.acm.org\/citation.cfm?id=1929820.1929822"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/168619.168635"},{"key":"e_1_3_2_2_41_1","volume-title":"Proceedings of the 2015 USENIX Conference on Usenix Annual Technical Conference (USENIX ATC '15). USENIX Association","author":"Wang Jun","year":"2015","unstructured":"Jun Wang , Xi Xiong , and Peng Liu . 2015 . Between Mutual Trust and Mutual Distrust: Practical Fine-grained Privilege Separation in Multithreaded Applications . In Proceedings of the 2015 USENIX Conference on Usenix Annual Technical Conference (USENIX ATC '15). USENIX Association , Berkeley, CA, USA, 361--373. http:\/\/dl.acm.org\/citation.cfm?id=2813767.2813794 Jun Wang, Xi Xiong, and Peng Liu. 2015. Between Mutual Trust and Mutual Distrust: Practical Fine-grained Privilege Separation in Multithreaded Applications. In Proceedings of the 2015 USENIX Conference on Usenix Annual Technical Conference (USENIX ATC '15). USENIX Association, Berkeley, CA, USA, 361--373. http:\/\/dl.acm.org\/citation.cfm?id=2813767.2813794"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2014.217"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1346256.1346267"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.25"}],"event":{"name":"CCS '18: 2018 ACM SIGSAC Conference on Computer and Communications Security","location":"Toronto Canada","acronym":"CCS '18","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3243734.3243748","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3243734.3243748","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:57:32Z","timestamp":1750208252000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3243734.3243748"}},"subtitle":["A Portable User Mode Privilege Separation Architecture on x86"],"short-title":[],"issued":{"date-parts":[[2018,10,15]]},"references-count":44,"alternative-id":["10.1145\/3243734.3243748","10.1145\/3243734"],"URL":"https:\/\/doi.org\/10.1145\/3243734.3243748","relation":{},"subject":[],"published":{"date-parts":[[2018,10,15]]},"assertion":[{"value":"2018-10-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}